General questions Flashcards
What type of information does a control risk use?
Financial information
Control risks specifically apply to financial information, where they may impact the integrity or availability of the financial information.
Dave has been required to build his company’s security policies. Which of the following policies is commonly put in place for service accounts?
They cannot use interactive logins
It is common practice to prohibit interactive logins to a GUI or shell for service accounts. Use of a service account for interactive logins or attempting to log in as one should be immediately flagged and alerted on as an indicator of compromise (IoC).
What type of technique is commonly used by malware creators to shift the signature of malware to prevent detection by antivirus tools?
Refactoring
Refactoring a program by automated means can include adding additional text, comments, or nonfunctional operations to make the program have a different signature without changing its operations. This is typically not a manual operation due to the fact that antimalware tools can quickly find new versions. Instead, refactoring is done via a polymorphic or code mutation technique that changes the malware every time it is installed to help avoid signature-based systems.
Bruce needs a cryptographic algorithm that provides low latency. What type of cryptosystem is most likely to meet this performance requirement?
Symmetric encryption
A symmetric cryptosystem will typically perform faster and with less processor overhead and thus lower latency than asymmetric cryptosystems. Hashing is not encryption, and one-time pads are not implemented in modern cryptosystems, although they may have uses in the future quantum cryptographic solutions.
Luna needs to capture the contents of physical memory by using a command-line tool on Linux system. Which of the following tools can apply on this task?
memdump
The memdum tool ios a command0line memory dump utility that can dump physical memory. Somewaht confusingly, memdump is also a flag in the very useful Volatility framework, where it can be used to dump memory as well. The remaining options were made up and are not Linux tools, although you can create a ramdump on Android devices.
Selina needs to determine services on a remote machine and label the services with service names and other general details. Of the following tools, which one will not give that information.
netcat
Although all of the tools listed can perform a port scan and identify open ports, netcat is the only one that does not also integrate automated service identification.
Which of the following term describes a military strategy for political warfare that merges conventional warfare, irregular warfare, and cyberwarfare with fake news, social media influence strategies, diplomatic efforts, and manipulation of legal activities?
Hybrid warfare
Carly has been asked to set up access control for a server. The requirements state that users at a lower privilege level should not be able to see or access files or data at a higher privilege level. What access control model would best fit these requirements?
MAC
Mandatory access control (MAC). It will not allow lower privileged users to even see the data at a higher privilege level.
Nathan operates a vulnerability scan using up-to-date definitions for a system that he knows has a vulnerability in the version of Apache that it is running. The vulnerability scan does not show that issue when he reviews the report. What has Nathan addressed?
A false negative
A false negative occurs with a vulnerability scanning system when a scan is run and an issue that exists is not identified.
Your security manager needs to determine which risks to minimize based on cost. This is an example of:
Quantitative risk assessment is the process of assigning numerical values to the probability an event will occur and what impact the event will have.
Your company has produced some new security directives. One of these new directives is that all documents must be shredded before being thrown out. Which of the following types of attack is this attempting to prevent?
Dumpster diving
Olivia has issued Android tablets to staff in her production facility, but cameras are banned due to sensitive data in the building. What type of tool can she use to control camera use on all of her organization ‘ s corporate devices that she issues?
MDM
Mobile device management (MDM) tool, allows control of the devices, which would allow Olivia to lock out cameras and preventing staff members from using the tablets to take pictures.
Gabriel wants to enforce a wide variety of settings for devices used in her organization. Which of the following methods should she select if she needs to manage hundreds of devices while setting rules for use of SMS and MMS, audio and video recording, GPS tagging, and wireless connection methods like tethering and hotspot modes?
Use a UEM tool and application to manage the devices.
A universal endpoint management (UEM) tool can manage desktops, laptops, mobile devices, printers, and other devices. UEM tools are often used applications deployed to mobile devices to configure and manage them.
How does asymmetric encryption support nonrepudiation?
Using digital signatures
Digital signatures that use a sender’s private key provide nonrepudiation by allowing a sender to prove that they sent a message.
Manus is concerned about someone using a password cracker on computers in his company. He is concerned that crackers will attempt common passwords in order to log in to a system. Which of the following would be best for mitigating this threat?
Account lockout policies
Accounts should lock out after a small number of login attempts. Three is a common number of attempts before the account is locked out.
The virtual machine cluster that Brian takes responsibility for has experienced a huge failure in its primary controller. The entire company is offline, and users cannot get to the company’s website which is its primary business. What type of disaster is it?
An internal disaster
This is an internal disaster — one in which internal issues have led to a problem.
When a program has variables, especially arrays, and does not check the boundary values before inputting data, what attack is the program vulnerable to?
Buffer overflow
A buffer overflow is possible when boundaries are not checked and the attacker tries to put in more data than the variable can hold.
Joce has been asked to implement a directory service. Which of the following technologies should she deploy?
LDAP
the only directory service listed is Lightweight Directory access protocol (LDAP).